COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
True
|
|
False
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -Hot site. A hot site is a backup facility which represents a mirrored copy of the primary production center. A hot site is equipped with all the necessary hardware, software, and network connectivity, which allows you to perform near real-time backup or replication of the critical data.
Detailed explanation-2: -Hot site. This is a location where the target environment is already up and running and can be immediately activated by a failover. There are also high availability architecture options where you can have multiple nodes in a clustering or load balancing setup.
Detailed explanation-3: -Definition(s): A fully operational offsite data processing facility equipped with hardware and software, to be used in the event of an information system disruption.
Detailed explanation-4: -Warm sites are “ready to go” in one sense, but they still need to have data transported to them for use in recovery should a disaster occur. Hot Computing Sites-a fully functional backup site that already has important data mirrored to it. This is the ideal disaster recovery site but can be challenging to attain.